SlideShare a Scribd company logo
1 of 28
o

o

o

o

o

o

Nosstateful
Stateful

DMZ
Proxy
download

1

Firewall
5

DEC
8

AT&T Bell Laboratories

.
. SEAL

"SEAL"

Cisco

2

Packet Filtering Firewalls
Cisco
4
Jeff Mogul
5
Digital Equipment Corporation
6
Dave Presetto
7
Howard Trickey
3

8
9

circuit level firewalls
Bill Cheswick
11
Marcus Ranum
12
Gene Spafford
13
Application Layer Firewalls
14
Proxy-Based Firewalls
15
Bob Braden
16
Annette DeSchlon
17
Visas
18
Visual Integration
19
Check Point Software
20
Scott Wiegel
21
Global Internet Software Group
22
Kernel Proxy architecture
10

DEC
"

"

.

.

23

fireWall
URL
-

DsL

patch
24

Packet Filtering
mini Computer

DVD

CD
E-mail

Trojan

E-mail Worms
Worm

25

E-mail Worms
Simple Mail Transfer Protocol

26

26

SMTP
Dial up
upgrade

upgrade

un-install

memory CPU
dialup

TCP

TCP

TCP

27

No Interface
Circuit-LeveL

28
Nosstateful packet

IP
Stateful Packet

UDP TCP
TCP
FTP

Stateful

TCP

TCP
HTTP

PC
DMZ

DMZ
:
IP

IP

IP
IP

: , ,,.
64 16
236 52

IP

IP
.
IP
IP
69,254,15,25

www
. .
goole
com

.

browser

http
:

29

domain names

30

client
31
server
32

IP

TCP

.
34

HTTP

UDP
FTP
ICMP
.
SMTP

SNMP

FTP
.

"
x-rated
"
"
x-rated " rated
" x
"

32

Internet Protocol
Transmission Control Protocol
34
Hyper Text Transfer Protocol
35
User Datagram Protocol
36
File Transfer Protocol
37
Internet Control Message Protocol
38
Simple mail transport protocol
39
Simple Network Management protocol
33

( )
FTP

(
HTTP
)
LAN
resource

.
.
IP TCP
:
40

40

Accept Mode
Blocking Mode

41
42

.

.
TCP/IP

header

:

FTP Telnet
Telnet
header

header

IP
:

IP
.
IP
IP

.

42

Response Mode
Identifier & Fragment Offset

43
.
.

44

IP
.

IP
.

:

header
:

ftp
TCP
ftp
Telnet
.
.

:
46

:

TCP

44

Pocket Filtering Router
Acknowledgment
46
TCP code Bits
45

SYN=1
TCP

"

"
TCP
.
.

:

.

.

header

TCP
:

.

(backdoor)
.
e-mail
e-mail
SMTP

e-mail

e-mail

.
backdoor

.

.
.

.
e - mail
.

47

e -mail
e-mail

Remote Login
Application Backdoor
49
SMTP session hijacking
50
spam
51
Operating system bugs
52
Denial of service
48

e-mail

E- mail
.

.

.

.

backdoor

cookie

ICMP

.

e-mail

.
.

53

Macros
Spam
55
Redirect bombs
56
Source routing
54

e-mail
e-mail
.

.

DMZ Proxy
proxy

.

.

:

online
FTP
-

57

DMZ

DMZ

.
DMZ
DMZ

DMZ

57

Demilitarized Zone

gateway
NAT
ZonAlram pro
2008

ZoneAlarm

Shield Pro FireWall
2008

repair

Hauri
inbox

Prisma FireWall

TCP

Panda

.

. .
URL

.

proxy
proxy

http

.

free proxy
:

www.homenethelp.com/web/ howto/free-firewall.asp
http://www.all-internet-security.com/top_10_firewall_software.html
http://networking.anandsoft.com/ad vantages-of-hardware-firewalls.html
http://www.faqs.org/qa/qa-4838.html
http://www.smallbusinesscomputing.c om/webmaster/article.php/3103431
http://personal-firewall-software-review.t optenreviews.com/hardware-firewalls-vssoftware-firewalls.html
http://www.webopedia.com/didyouknow/hardwaresoftware/2004/firewall_types.asp
http://www.evaluateit.co.uk/small_business/firewalls.html
http://cms-london.com/ articletext.php?id=105
http://www.srco.ir/Articles/TipsView.asp?ID=254
http://www.alliancedatacom.com/firewall-tutorial.htm
http://www.npc-rt.ir/newsdetail-fa-20.html
http://fa.wikipedia.org/wiki
http://atalebi.com/articles/show.asp?ID=427
http://www.iran20.ir/view.asp?id=50005879719100001
http://forum.sohail2d.com/viewtopic.php?t=9183
http://www.iritn.com/?action=show&type=news&id=7216
http://www.microrayaneh.com/Articles/Internet/Firewall2.htm
http://www.indstate.edu/ect/ECT680/fall03_papers/Pramod.pdf

More Related Content

What's hot

us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
sonjeku1
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
Hanaysha
 

What's hot (15)

Securing & Optimizing Linux the Hacking Solution (v.3.0)
Securing & Optimizing Linux the Hacking Solution (v.3.0)Securing & Optimizing Linux the Hacking Solution (v.3.0)
Securing & Optimizing Linux the Hacking Solution (v.3.0)
 
Common Ports
Common PortsCommon Ports
Common Ports
 
Intro To Hacking
Intro To HackingIntro To Hacking
Intro To Hacking
 
Metasploitable
MetasploitableMetasploitable
Metasploitable
 
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-La...
 
Report (11)
Report (11)Report (11)
Report (11)
 
Shadow pad technical_description_pdf
Shadow pad technical_description_pdfShadow pad technical_description_pdf
Shadow pad technical_description_pdf
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
 
Passive Fingerprinting of HTTP/2 Clients by Ory Segal
Passive Fingerprinting of HTTP/2 Clients by Ory SegalPassive Fingerprinting of HTTP/2 Clients by Ory Segal
Passive Fingerprinting of HTTP/2 Clients by Ory Segal
 
2008-11-13 CAVMEN RHEL for System z Deep Dive
2008-11-13 CAVMEN RHEL for System z Deep Dive2008-11-13 CAVMEN RHEL for System z Deep Dive
2008-11-13 CAVMEN RHEL for System z Deep Dive
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
IoT Secure Bootsrapping : ideas
IoT Secure Bootsrapping : ideasIoT Secure Bootsrapping : ideas
IoT Secure Bootsrapping : ideas
 
Using system fingerprints to track attackers
Using system fingerprints to track attackersUsing system fingerprints to track attackers
Using system fingerprints to track attackers
 
Undead Attack
Undead AttackUndead Attack
Undead Attack
 
Hot potato Privilege Escalation
Hot potato Privilege EscalationHot potato Privilege Escalation
Hot potato Privilege Escalation
 

Viewers also liked

تئوری آنتن های ماهوره ای
تئوری آنتن های ماهوره ایتئوری آنتن های ماهوره ای
تئوری آنتن های ماهوره ای
Dany Khosravi
 
Killi horiznes
Killi horiznesKilli horiznes
Killi horiznes
13fladjj1
 
One Pager Case Study- The Clubhouse
One Pager Case Study- The ClubhouseOne Pager Case Study- The Clubhouse
One Pager Case Study- The Clubhouse
Denver Hollingsworth
 
Perguntas frequentes sobre a semente de chia
Perguntas frequentes sobre a semente de chiaPerguntas frequentes sobre a semente de chia
Perguntas frequentes sobre a semente de chia
Semente de Chia
 

Viewers also liked (14)

Security
SecuritySecurity
Security
 
امنیت شبکه های مخابراتی
امنیت شبکه های مخابراتیامنیت شبکه های مخابراتی
امنیت شبکه های مخابراتی
 
شبکه های ماهواره ای vsat
شبکه های ماهواره ای vsatشبکه های ماهواره ای vsat
شبکه های ماهواره ای vsat
 
تئوری آنتن های ماهوره ای
تئوری آنتن های ماهوره ایتئوری آنتن های ماهوره ای
تئوری آنتن های ماهوره ای
 
Killi horiznes
Killi horiznesKilli horiznes
Killi horiznes
 
Using A Management Consultancy: What To Expect
Using A Management Consultancy: What To ExpectUsing A Management Consultancy: What To Expect
Using A Management Consultancy: What To Expect
 
One Pager Case Study- The Clubhouse
One Pager Case Study- The ClubhouseOne Pager Case Study- The Clubhouse
One Pager Case Study- The Clubhouse
 
Perguntas frequentes sobre a semente de chia
Perguntas frequentes sobre a semente de chiaPerguntas frequentes sobre a semente de chia
Perguntas frequentes sobre a semente de chia
 
CISCO Packet Tracer
CISCO Packet TracerCISCO Packet Tracer
CISCO Packet Tracer
 
Mss Lick09
Mss Lick09Mss Lick09
Mss Lick09
 
International 2nd scientific e conference
International 2nd scientific e conferenceInternational 2nd scientific e conference
International 2nd scientific e conference
 
Consulta general
Consulta generalConsulta general
Consulta general
 
Education
EducationEducation
Education
 
Utm
UtmUtm
Utm
 

Similar to Firewall

Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and security
Michael Earls
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
CODE BLUE
 
LAN Diagram Sample 2015
LAN Diagram Sample 2015LAN Diagram Sample 2015
LAN Diagram Sample 2015
Glenn MacKie
 

Similar to Firewall (20)

GREAT MINDS
GREAT MINDSGREAT MINDS
GREAT MINDS
 
RAZORPOINT TCP/UDP PORTS LIST
RAZORPOINT TCP/UDP PORTS LISTRAZORPOINT TCP/UDP PORTS LIST
RAZORPOINT TCP/UDP PORTS LIST
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and security
 
Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)
 
Puertos comunes
Puertos comunesPuertos comunes
Puertos comunes
 
Geek Pic-Nic Master Class
Geek Pic-Nic Master ClassGeek Pic-Nic Master Class
Geek Pic-Nic Master Class
 
Intro to firewalls
Intro to firewallsIntro to firewalls
Intro to firewalls
 
FreeLix: Semplicità & Controllo
FreeLix: Semplicità & ControlloFreeLix: Semplicità & Controllo
FreeLix: Semplicità & Controllo
 
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi SubsystemTutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
Tutorial WiFi driver code - Opening Nuts and Bolts of Linux WiFi Subsystem
 
Common ports
Common portsCommon ports
Common ports
 
Common Ports .pdf
Common Ports .pdfCommon Ports .pdf
Common Ports .pdf
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
Using PerfDHCP tool to scale DHCP in OpenStack Neutron
Using PerfDHCP tool to scale DHCP in OpenStack NeutronUsing PerfDHCP tool to scale DHCP in OpenStack Neutron
Using PerfDHCP tool to scale DHCP in OpenStack Neutron
 
network connet
network connetnetwork connet
network connet
 
ATT&CK BINGO
ATT&CK BINGOATT&CK BINGO
ATT&CK BINGO
 
Intel DPDK Step by Step instructions
Intel DPDK Step by Step instructionsIntel DPDK Step by Step instructions
Intel DPDK Step by Step instructions
 
How Microsoft will MiTM your network
How Microsoft will MiTM your networkHow Microsoft will MiTM your network
How Microsoft will MiTM your network
 
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
 
Multi cloud security with cisco cloud services (Taras Kolodchyn)
Multi cloud security with cisco cloud services (Taras Kolodchyn)Multi cloud security with cisco cloud services (Taras Kolodchyn)
Multi cloud security with cisco cloud services (Taras Kolodchyn)
 
LAN Diagram Sample 2015
LAN Diagram Sample 2015LAN Diagram Sample 2015
LAN Diagram Sample 2015
 

More from arichoana (20)

Adsl Configuration Part b
Adsl Configuration Part bAdsl Configuration Part b
Adsl Configuration Part b
 
Part a
Part aPart a
Part a
 
Part a
Part aPart a
Part a
 
Hassan semyari data center
Hassan semyari   data centerHassan semyari   data center
Hassan semyari data center
 
Active directory
Active directoryActive directory
Active directory
 
Voip
VoipVoip
Voip
 
تفاوت ADSL با SHDSL
تفاوت ADSL با SHDSLتفاوت ADSL با SHDSL
تفاوت ADSL با SHDSL
 
وایمکس
وایمکسوایمکس
وایمکس
 
پروژه مسیریاب
پروژه مسیریابپروژه مسیریاب
پروژه مسیریاب
 
پروژه مسيرياب
پروژه مسيريابپروژه مسيرياب
پروژه مسيرياب
 
آشنایی با شبکه های سلولی GSM
آشنایی با شبکه های سلولی GSMآشنایی با شبکه های سلولی GSM
آشنایی با شبکه های سلولی GSM
 
اينترنت ماهواره
اينترنت ماهوارهاينترنت ماهواره
اينترنت ماهواره
 
Ddos dos
Ddos dosDdos dos
Ddos dos
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
VPLS
VPLSVPLS
VPLS
 
انواع خطوط مخابراتی
انواع خطوط مخابراتیانواع خطوط مخابراتی
انواع خطوط مخابراتی
 
امنیت شبکه
امنیت شبکهامنیت شبکه
امنیت شبکه
 
تفاوت پایه ای شبکه های وایرلس
تفاوت پایه ای شبکه های وایرلستفاوت پایه ای شبکه های وایرلس
تفاوت پایه ای شبکه های وایرلس
 
Hr book 6.
Hr book 6.Hr book 6.
Hr book 6.
 
Hr book 5.
Hr book 5.Hr book 5.
Hr book 5.
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Firewall